메뉴 건너뛰기




Volumn 6, Issue 1, 2011, Pages 39-52

Exploiting trust-based social networks for distributed protection of sensitive data

Author keywords

Anonymity; availability; complex system; security; social network; social trust; threshold cryptography

Indexed keywords

ANONYMITY; COMPLEX SYSTEM; SECURITY; SOCIAL NETWORKS; SOCIAL TRUST; THRESHOLD CRYPTOGRAPHY;

EID: 79951837447     PISSN: 15566013     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIFS.2010.2093521     Document Type: Article
Times cited : (24)

References (33)
  • 1
    • 0036013593 scopus 로고    scopus 로고
    • Statistical mechanics of complex net-works
    • R. Albert and A. Barabasi, "Statistical mechanics of complex net-works," Rev. Modern Phys., vol. 74, pp. 47-97, 2002.
    • (2002) Rev. Modern Phys. , vol.74 , pp. 47-97
    • Albert, R.1    Barabasi, A.2
  • 2
    • 0034721164 scopus 로고    scopus 로고
    • Error and attack tolerance of complex networks
    • R. Albert, H. Jeong, and A. Barabasi, "Error and attack tolerance of complex networks," Nature, vol. 406, pp. 378-482, 2000.
    • (2000) Nature , vol.406 , pp. 378-482
    • Albert, R.1    Jeong, H.2    Barabasi, A.3
  • 3
    • 84949221689 scopus 로고    scopus 로고
    • Spectral techniques in graph algorithms
    • N. Alon, "Spectral techniques in graph algorithms," in Proc. LATIN'98, 1998, pp. 206-215. (Pubitemid 128056278)
    • (1998) Lecture Notes in Computer Science , Issue.1380 , pp. 206-215
    • Alon, N.1
  • 4
    • 33744479345 scopus 로고    scopus 로고
    • Freenet: A distributed anonymous information storage and retrieval system
    • Designing Privacy Enhancing Technologies
    • I. Clarke, O. Sandberg, B. Wiley, and T. Hong, "Freenet: A distributed anonymous information storage and retrieval system," Lecture Notes in Computer Science, vol. 2009, pp. 46-66, 2001. (Pubitemid 33241787)
    • (2001) Lecture Notes in Computer Science , Issue.2009 , pp. 46-66
    • Clarke, I.1    Sandberg, O.2    Wiley, B.3    Hong, T.W.4
  • 9
    • 0023985465 scopus 로고
    • A digital signature scheme secure against adaptive chosen-message attacks
    • Apr.
    • S. Goldwasser, S. Micali, and R. Rivest, "A digital signature scheme secure against adaptive chosen-message attacks," SIAMJ. Computing, vol. 17, no. 2, pp. 281-308, Apr. 1988.
    • (1988) SIAM J. Computing , vol.17 , Issue.2 , pp. 281-308
    • Goldwasser, S.1    Micali, S.2    Rivest, R.3
  • 14
    • 84880864572 scopus 로고    scopus 로고
    • Two-party generation of dsasignatures
    • Springer-Verlag
    • P. Mac Kenzieand M. Reiter,"Two-party generation of dsasignatures," inProc CRYPTO2001, 2001, pp. 137-154, Springer-Verlag.
    • (2001) Proc CRYPTO2001 , pp. 137-154
    • Mac Kenzieand, P.1    Reiter, M.2
  • 18
    • 0003508562 scopus 로고
    • National Instituteof Standards and Technology (NIST) May 19
    • Digital Signature Standard, FIPS Publication 186, National Institute of Standards and Technology (NIST), May 19, 1994.
    • (1994) Digital Signature Standard, FIPS Publication 186
  • 20
    • 33645418463 scopus 로고    scopus 로고
    • Safe and private data sharing with turtle: Friends team-up and beat the system
    • B. Popescu, B. Crispo, and A. Tanenbaum, "Safe and private data sharing with turtle: Friends team-up and beat the system," in Proc. Security Protocols Workshop, 2004, pp. 213-220.
    • (2004) Proc. Security Protocols Workshop , pp. 213-220
    • Popescu, B.1    Crispo, B.2    Tanenbaum, A.3
  • 21
    • 84957689308 scopus 로고    scopus 로고
    • A simplified approach to threshold and proactive RSA
    • Advances in Cryptology - CRYPTO '98
    • T. Rabin, "A simplified approach to threshold and proactive RSA," in Proc. CRYPTO'98, 1998, pp. 89-104, Springer. (Pubitemid 128118999)
    • (1998) Lecture Notes in Computer Science , Issue.1462 , pp. 89-104
    • Rabin, T.1
  • 22
    • 0017930809 scopus 로고
    • Method for obtaining digital signatures and public-key cryptosystems
    • DOI 10.1145/359340.359342
    • R. Rivest, A. Shamir, and L. Adleman, "A method for obtaining digital signatures and public-key cryptosystems," Commun. ACM, vol. 21, no. 2, pp. 120-126, 1978. (Pubitemid 8591219)
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 24
    • 12344258539 scopus 로고
    • Efficient signature generation by smart cards
    • C. P. Schnorr, "Efficient signature generation by smart cards," J. Cryptology, vol. 4, pp. 161-174, 1991.
    • (1991) J. Cryptology , vol.4 , pp. 161-174
    • Schnorr, C.P.1
  • 25
    • 0018545449 scopus 로고
    • How to share a secret
    • Nov.
    • A. Shamir, "How to share a secret," Commun. ACM, vol. 22, pp. 612-613, Nov. 1979.
    • (1979) Commun. ACM , vol.22 , pp. 612-613
    • Shamir, A.1
  • 26
    • 34547453122 scopus 로고    scopus 로고
    • Understanding churn in peer-to-peer networks
    • DOI 10.1145/1177080.1177105, Proceedings of the 2006 ACM SIGCOMM Internet Measurement Conference, IMC 2006
    • D. Stutzbach and R. Rejaie, "Understanding churn in peer-to-peer networks," in Proc. 6th ACM SIGCOMM Conf. Internet Measurement (IMC'06), 2006, pp. 189-202. (Pubitemid 47165601)
    • (2006) Proceedings of the ACM SIGCOMM Internet Measurement Conference, IMC , pp. 189-202
    • Stutzbach, D.1    Rejaie, R.2
  • 27
    • 79951837200 scopus 로고    scopus 로고
    • [Online] Available
    • TCG [Online]. Available: https://www.trustedcomputinggroup.org/
  • 29
    • 26844502785 scopus 로고    scopus 로고
    • Two efficient and provably secure schemes for server-assisted threshold signatures
    • S. Xu and R. Sandhu, "Two efficient and provably secure schemes for server-assisted threshold signatures," in Proc. Topics in Cryptology (CT-RSA 2003), 2003, pp. 355-372.
    • (2003) Proc. Topics in Cryptology (CT-RSA 2003) , pp. 355-372
    • Xu, S.1    Sandhu, R.2
  • 30
  • 31
    • 0004196480 scopus 로고
    • Ph.D. thesis Carnegie Mellon Univ., Pittsburgh, PA
    • B. Yee, "Using Secure Coprocessors," Ph.D. thesis, Carnegie Mellon Univ., Pittsburgh, PA, 1994.
    • (1994) Using Secure Coprocessors
    • Yee, B.1
  • 33
    • 33750285481 scopus 로고    scopus 로고
    • SybilGuard: Defending against sybil attacks via social networks
    • DOI 10.1145/1151659.1159945
    • H. Yu, M. Kaminsky, P. Gibbons, and A. Flaxman, "Sybilguard: Defending against sybil attacks via social networks," in Proc. ACMSIGCOMM 2006, 2006, pp. 267-278. (Pubitemid 44623733)
    • (2006) Computer Communication Review , vol.36 , Issue.4 , pp. 267-278
    • Yu, H.1    Kaminsky, M.2    Gibbons, P.B.3    Flaxman, A.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.